Search Results - (( level classification rules algorithm ) OR ( java implementation model algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction by Mohd Aris, Teh Noranis, Abu Bakar, Azuraliza, Mahiddin, Normadiah, Zolkepli, Maslina

    Published 2024
    “…Overall, the proposed fuzzy rule-based diabetes diagnosis and level of care fuzzy model works well with most of the machine learning algorithms tested. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Power quality problem classification based on Wavelet Transform and a Rule-Based method by Nallagownden, Perumal

    Published 2010
    “…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method by Chuah , Heng keow, Nallagownden, Perumal, Kondapalli, K.S. Rama Rao

    Published 2010
    “…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method by keow, Chuah Heng, Nallagownden, Perumal, K. S. , Rama Rao

    Published 2010
    “…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…The manually developed OBIA rule-sets achieved the transferable land cover classification in different areas. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman by Abdul Aziz, Maslina, Mustakim, Nurul Ain, Abdul Rahman, Shuzlina

    Published 2024
    “…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
    Get full text
    Get full text
    Article
  12. 12

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    An enhanced intelligent database engine by neural network and data mining by Chua, Boon Lay, Khalid, Marzuki, Yusof, Rubiyah

    Published 2000
    “…Thus, the first problem is curbed by generating multiple level rules, by incorporating multiple attribute support and level confidence to the initial Apriori. …”
    Get full text
    Get full text
    Article
  15. 15

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…It is designed to incorporate with the CAPSOCA algorithm which intended to strengthen the classification outcomes. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  20. 20